Weak isolation on dual-use endpoint
This lab makes a flawed assumption about the user's privilege level based on their input. As a result, you can exploit the logic of its account management features to gain access to arbitrary users' accounts. To solve the lab, access the administrator
account and delete the user carlos
.
You can log in to your own account using the following credentials: wiener:peter
I can immediately identify the change password functionality. When attempting to modify a user's password, the parameters involved are as follows:
username=wiener
current-password=peter
new-password-1=password
new-password-2=password
The objective is to log in as the administrator user. Therefore, by intercepting the change-password POST request, I can alter the username to "administrator," omit the current-password parameter along with its value, and input a new password. The modified request will look like this:
Password changed successfully!
Now, all that remains is to log in as the administrator using the updated password and proceed to delete the user "carlos" to successfully resolve the lab.
Last updated